Kingo Android Root [KNOX 0x0 Root] - The easy way!

Zionator

Senior Member
Jan 28, 2009
2,120
640
198
Birmingham
www.Infowars.com
Hi,

I just got my Note 3 and was annoyed by the hole knox issue so i started to read back & forward after a few hours i found this program called kingo which i liked cause i only had to install it and start the program and the rest was done for me by the program.

Here are the easy steps to rooting.

1. Install the Note 3 drivers on the PC "all i did was plug-in the phone and it was installed for me".
2. Install Kingo (LINKS REMOVED)
3. Open the program and follow the simple instructions on you monitor.

When it's done you are rooted and your knox will still be 0x0.
After this i used Odin to flash the TWRP 2.6.3.7 and the knox was still 0x0.
I then shut off the phone to reboot into TWRP and did a backup of the stock rom rooted. Once done backing up the rom i rebooted into download mode and noticed that it knox was changed to 0x1.
So if you want root on stock rom then this is the easiest solution but you wont get custom recovery nor custom roms without tripping the knox counter for now.
 
Last edited by a moderator:
  • Like
Reactions: theresident

blumsen

Senior Member
Aug 15, 2010
136
31
0
Hi,

I just got my Note 3 and was annoyed by the hole knox issue so i started to read back & forward after a few hours i found this program called kingo which i liked cause i only had to install it and start the program and the rest was done for me by the program.

Here are the easy steps to rooting.

1. Install the Note 3 drivers on the PC "all i did was plug-in the phone and it was installed for me".
2. Install Kingo from here.
3. Open the program and follow the simple instructions on you monitor.

When it's done you are rooted and your knox will still be 0x0.
After this i used Odin to flash the TWRP 2.6.3.7 and the knox was still 0x0.
I then shut off the phone to reboot into TWRP and did a backup of the stock rom rooted. Once done backing up the rom i rebooted into download mode and noticed that it knox was changed to 0x1.
So if you want root on stock rom then this is the easiest solution but you wont get custom recovery nor custom roms without tripping the knox counter for now.
As far as I know Kingo is banned on XDA forums until further notice, unless they finally got approved? Not to get you paranoid or anything, but suspicious communications with a chinese server were part of the rooting method you just used.
 
  • Like
Reactions: jan922 and KBJ911

Zionator

Senior Member
Jan 28, 2009
2,120
640
198
Birmingham
www.Infowars.com
As far as I know Kingo is banned on XDA forums until further notice, unless they finally got approved? Not to get you paranoid or anything, but suspicious communications with a chinese server were part of the rooting method you just used.
Why is it suspicious ? I mean it's most likely downloading what's needed for rooting and bypassing the knox system.
If it was banned then there should be a post so others know about it.
I am using Zonealarm firewall and i wasn't made aware of any suspicious behaviour.
 

blumsen

Senior Member
Aug 15, 2010
136
31
0
Why is it suspicious ? I mean it's most likely downloading what's needed for rooting and bypassing the knox system.
If it was banned then there should be a post so others know about it.
I am using Zonealarm firewall and i wasn't made aware of any suspicious behaviour.
1. It is suspicious because nobody knows who Kingo are. It is suspicious because the process is not transparent and it was not known what kind of information is collected from your device (or why) and what information is received (and possibly installed on your PC/ device). The exploit that they use for rooting is also kept secret. The server's IP they use is chinese. Some of the information they collect is arguably not necessary (for example your device's IMEI). The communication with Kingo is over a facebook page. Hmm.. can't think of more suspicious things right now, but that is plenty I think :)
2. "It is most likely just.." yes that is true. and for 99% of users that is good enough. Myself, I will lose my job if my clients/ employers find such a huge security hole which I am aware of and ignore. But then again they also expect me to never get near the WWW with my work phone or computer, I am not allowed to have a wifi module in my work laptop! You can see why a "probably just a harmless connection to China" is just not good enough in some situations.
3. If you do a search on XDA for Kingo, you will see that all threads were closed by admins.
4. Time for you to get a new firewall, or tinker with the settings! :D
 

xclub_101

Senior Member
Oct 15, 2012
1,243
355
0
I have no idea what you are talking about.
With firmware before MJ3 there is a separate method called Universal Root De La Vega (URDLV) which is a lot more transparent and which (as long as you keep updating with Mobile Odin Pro and you do not change stock kernel and stock recovery) is giving you full root while keeping your Knox 0x0 (if you had it 0x0 before URDLV).
 

Zionator

Senior Member
Jan 28, 2009
2,120
640
198
Birmingham
www.Infowars.com
With firmware before MJ3 there is a separate method called Universal Root De La Vega (URDLV) which is a lot more transparent and which (as long as you keep updating with Mobile Odin Pro and you do not change stock kernel and stock recovery) is giving you full root while keeping your Knox 0x0 (if you had it 0x0 before URDLV).
Oh ok but i have already flashed a custom recovery and rom. To hell with the warranty. I have never liked any stock roms and i like my freedom so my knox will most likely look like 0x2 now.

Kingo : Well if it's that bad then i am sure the moderators will close this and had i known this was the issue then i wouldn't have made this thread. However i would still have used this method if i knew this before as i never stay on stock rom and after finding out about the stupid chip that cant be recoded i didn't wanna wait for someone to come with a solution in one years time so i flashed the rom and recovery and now enjoying the phone :)

So if the Kingo really is that bad it has been wiped from my phone when i flashed a new rom.
 

KennyG123

Senior Moderator / Moderator Committee / Spider-Mo
Staff member
Nov 1, 2010
39,181
51,636
263
Right behind you!
Does not belong in Original Development, you did not create Kingo.
Moved to General
Use at your own risk. Rooting process has been known to collect and transmit IMEI and Serial numbers to China
FNSM
 

iTTi

Senior Member
Nov 1, 2009
371
51
0
Lahore
Before I even read the posts and start asking questions, I would like to know one thing. That is what does that United Arab Emirates mean in the pic below, its my screen after entering "About"
and can I root my device without any sort of issues?
 

Attachments

KennyG123

Senior Moderator / Moderator Committee / Spider-Mo
Staff member
Nov 1, 2010
39,181
51,636
263
Right behind you!
Just FYI - but Kingo stopped collecting the IMEI numbers a few versions ago.
That is great news! Our security expert has not been available to confirm this and Kingo has not sent us any correspondence to notify us of that. Has anyone confirmed this by recording data traffic while rooting?
 

Zionator

Senior Member
Jan 28, 2009
2,120
640
198
Birmingham
www.Infowars.com
Ok i have been reading around the net and all the reported security issues comes back to XDA.

wmshua.com is the site the connection is sent out to but is it possible that the app connects to their servers only in order to download the appropriate phone/device drivers.

On there web site under F.A.Q's
Q. Why don't you publish your source code?

A1. We kind of hope, in the future, Kingo Android Root could generate revenue to support our staff (STILL FREE FOR USERS). We all know that, in the long run, interest alone cannot make a living. To develop better software, we need to be financially motivated aside from being driven by passion.

A2. We manage to obtain root privilege of Android by exploiting certain undisclosed vulnerabilities, which we believe would be patched in no time once made public. And that would dysfunction this software that we've worked so hard for.
However it pushes Chainfires SuperSU to the device's and apparently they didn't ask him for his permission to use his work.

All in all i don't think isn't a matter of security issue anymore but more likely a matter of hard fellings that they stole Chainfires SuperSU to use in there app without asking him.

Correct me if i am wrong ?
 
Last edited:
Our Apps
Get our official app!
The best way to access XDA on your phone
Nav Gestures
Add swipe gestures to any Android
One Handed Mode
Eases uses one hand with your phone